The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to get the best mode, H.264 computes the cost of every mode for each block by RDO (rate distortion optimization) technique, but it increases a high computational complexity .This paper combines Pan's fast algorithm and an efficient fast mode decision for intra prediction is proposed. First, the intra prediction's types are decided by whether a block is smooth. Second, the Pan's fast algorithm...
The old documents in Jawi script are being used widely for references. The hard copies of those scripts will deteriorate as time passes. Most of the previous works on Jawi documents focused on the character recognition and the accuracy of the algorithm was very much affected by noise. An effective preprocessing method is required to binarize degraded Jawi document. In this paper, a new technique to...
The several different demosaicing or color interpolation methods are available to obtain the original image captured with a CFA (Color Filter Array). Use of any of these available methods need to be supported by an effectiveness measure of the algorithms for it to be useful. This paper proposes a fuzzy based measure to establish similarity measure for Color Interpolation algorithms. This similarity...
Infrared focal plane array IRFPA bad pixel correction in complex applications and rich details conditions is a common problem. Therefore, a scene-based bad pixel dynamic correction (SBBPDC) technique was investigated. Based on the adaptive median filtering bad pixel detection algorithm, using the key frame technique according to the scene change, the interframe statistics are applied to judging bad...
The current explosion of digital media creates threats towards the security in multimedia data broadcasting. Watermarking technique becomes a prospective solution to this coercion by means of Intellectual Property Right Protection, Authentication and Integrity Verification of digital media. In this paper we introduce an approach that enables us to develop a low power, real time, reliable and secure...
An automatic identification system for the OLED's black-spot detection was designed in this paper. Complete approaches based on machine vision technology are proposed to get the sub-pixel location of black-spots. In this method, feature area is recognized based on the identification of spots' edge characteristics. The method of circle fitting is used to get positions of the spots' center. The experiments...
Traditional watershed segmentation is sensitive to noise and can leads to serious over-segmentation. In order to overcome the shortcomings of traditional watershed segmentation, this paper presented an improved watershed image segmentation method. Firstly, the morphological opening/closing reconstruction filter is applied to remove the image noise. Secondly, multi-scale structure elements are used...
Image completion is an important task in the field of image processing with broad applications in image and vision analysis. we consider the image completion problem arising in image restoration: part of an image has been removed, and we want to restore the image from the remaining, possibly noisy, portion. In this paper, we present a new approach based on exemplar-based completion model which combines...
The cast shadows on the background of the object or scene will definitely affect the recognition of the foreground objects. Due to this unavoidable problem, the performance of the successful object recognition, image analysis and object tracking algorithms would be degraded. An efficient shadow detection and removal algorithm is necessary to make the algorithms outperform in the analysis, recognition...
Low-complexity error concealment techniques for missing macroblock (MB) recovery based on the boundary matching principle are extensively studied and evaluated. In this paper, an improved boundary matching algorithm (BMA) using adaptive search is presented to conceal channel errors in inter-frames of video images. The proposed scheme adaptively selects proper candidate regions to conceal the artifact...
In order to objectively and automatically evaluate the degree of digital image scrambling, introduce the grey relation analysis theory, the paper proposes a new evaluation method of image scrambling. In the method, the definition and the feature of the ideal scrambling image are analyzed first, whose histogram is summarized at the same time. And then, the scrambling image is divided into some sub-images...
In this paper, we propose selective estimation of least square based predictor algorithm and efficient overhead management scheme for lossless compression of digital mammograms. We exploit the characteristics of mammograms that most of the mammograms contain large number of blocks with constant gray level pixels, so a block based selective least square estimation algorithm is proposed. In our proposed...
Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), and Ant Colony System (ACS) are four of the main algorithms for solving challenging problems of intelligent systems. In this paper, these four techniques and three novel hybrid combinations of them are proposed to mammogram segmentation. The novel hybrid algorithms consist of a Sequential TS-ACS, a Hybrid ACS/TS, and a Sequential...
An obstacle detection algorithm based on U-V disparity map analysis is presented in this paper. We firstly introduce the obstacle detection mechanism using U-V disparity map generated from stereo match disparity map, and then an obstacle detection algorithm based on analysis of U-V disparity map characteristic is described. The combination of straight line fitting and the standard Hough Transform...
Image pulse sensors provide pixels information with a series of pulse train considering Pulse Frequency Modulation (PFM). PFM sensors are often used in vision chips considering related advantages. In this paper, edge detection and contrast enhancement algorithms are analyzed and simulated using pulse domain techniques of suppression and promotion. Comparing with classical methods, pulse-domain-based...
This paper presents a novel algorithm for enhancement of spatial resolution of images. The proposed algorithm estimates a Least square based predictor of lower order and interpolates the coefficients of higher order predictor. We have reduced the predictor order form p to (p-1) that results into a saving of computational power. The proposed algorithm is generic that can be used with most of the LS...
Motion estimation plays an important role in inter-frame prediction for the video coding standards such as H.264/AVC, MPEG-2, MPEG-4, VC-1, and so on. Its huge computation complexity, however, makes it difficult to achieve real-time coding for the HDTV1080p. In this paper, we propose a dynamic search range algorithm which reduces about 80% of search points in full search algorithm for the H.264/AVC...
Stereo vision algorithms can be divided into several general stages. Detailed analysis on each specific stage allows focused improvement of the entire algorithm. Existing stereo vision algorithms typically prioritize pixel and sub-pixel accuracy, focusing on the optimization stage, while commercial algorithms which prioritize real-time operation typically focus on the cost calculation stage. This...
This paper describes an efficient method for image edge and corner detection. Edges are detected before extracting corner points so that the background or noise of the image can be effectively removed. We propose an edge detector that utilizes edge features to localize the edge points. The corner points of an image are then identified by evaluating the degree of turning in the edge direction. The...
Steganographic techniques are being applied across a broad set of different digital technologies. The steganographic method will be used for internet/network security, watermarking and so on. So, the steganography is the process of hiding one medium of communication (Text, Sound, and Image) within another. It can work on JPEG 2000 compressed images & stir Mark images. The new method of steganalysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.